Heymann a Name I Call Myself

Total Page:16

File Type:pdf, Size:1020Kb

Heymann a Name I Call Myself UCILR V2I2 Assembled v4 (Do Not Delete) 7/14/2012 2:14 PM A Name I Call Myself: Creativity and Naming Laura A. Heymann* In recent years, various disputes involving the use of creative works have demonstrated how trademark-related concerns lurk at the heart of what are ostensibly copyright-related claims. When recording artists such as Jackson Browne or the members of Heart object to the unauthorized use of their songs in connection with a political campaign, they are most likely not troubled about the loss of revenue resulting from the use; rather, they are likely concerned that the public will wrongly assume that the use of the song indicates that they have endorsed the political candidate. But because it is sometimes easier for them to bring a successful copyright claim than a false endorsement claim, we risk an overbroad result: an injunction against the use of the work altogether, despite its expressive benefits, rather than a narrower injunction requiring a disclaimer or similar information- correcting device. Naming practices can, on occasion, illustrate the reverse trademark/copyright divide: disputes that more naturally fit a trademark- related framework but that actually embody copyright-related concerns. For example, innumerable advice columns have featured some variation of the following question: “We chose a lovely, original name for our soon-to-be born baby and told my sister-in-law about it. Now she has named her child, born last week, the exact same name. I can’t believe she stole our baby name. Should I ever speak to her again?” Although naming is typically seen as trademark-related, part (or all) of what causes this anguish is a copyright-related concern: the creativity that went into choosing, finding, or inventing the name and, relatedly, a desire to be recognized for that creativity. * Class of 2014 Professor of Law, College of William & Mary, Marshall-Wythe School of Law. Many thanks to Michael Adams, Mark Badger, Eric Goldman, Justin Hughes, Greg Lastowka, Mark Lemley, Mark McKenna, Brent Nicholas, Zahr Said, Michal Shur-Ofry, Jessica Silbey, David Simon, Eva Subotnik, Peter Swire, John Tehranian, Rebecca Tushnet, and the participants in the “Governing the Magic Circle: Regulation of Virtual Worlds” symposium at the UC Irvine School of Law, for which this piece was written, and the 2011 Intellectual Property Scholars Conference. Thanks also to John Alford, Patrick Berry, and Stefan Oehrlein for research assistance and to the staff of the UC Irvine Law Review. One of the risks of writing about online environments is the speed at which they change. The citations in this Article were accurate as of March 29, 2012, but may have since become outdated. 585 UCILR V2I2 Assembled v4 (Do Not Delete) 7/14/2012 2:14 PM 586 UC IRVINE LAW REVIEW [Vol. 2:585 Social networks, virtual worlds, and other forms of electronic interaction that require users to choose identifiers to facilitate communicative exchanges offer interesting environments in which to consider this intersection of trademark and copyright interests. If users select names as much for their expressive power as for their functional ability to distinguish one user from another, as they appear to do, what does that tell us about the kinds of creativity that matter to noncommercial creators? From where do some participants get the idea that names can be owned and, therefore, “stolen”? And what, then, do these instincts tell us about the interests and rhetoric that are typically invoked in discussions of intellectual property law? Introduction ..................................................................................................................... 586 I. Naming and Creativity ................................................................................................ 593 II. Naming, Creativity, and the Law ............................................................................. 600 A. Trademark Law ............................................................................................. 601 B. Copyright Law ............................................................................................... 607 III. Naming and Norms Online .................................................................................... 612 A. The Desire for Creativity ............................................................................. 614 B. Naming and Uniqueness .............................................................................. 618 Conclusion ........................................................................................................................ 622 Proper names are poetry in the raw. Like all poetry, they are untranslatable. —W.H. Auden1 INTRODUCTION Readers of advice columns have no doubt at least once come across something like the following (hypothetical) missive: “We chose a lovely, original name for our soon-to-be born baby and told my sister-in-law about it. Now she has named her child, born last week, exactly the same name. I can’t believe she stole our baby name. Should I ever speak to her again?”2 1. W.H. Auden, Names, Proper, in A CERTAIN WORLD 267, 267 (1970); cf. John Colapinto, Famous Names, NEW YORKER, Oct. 3, 2011, at 38, 39 (discussing naming consultant David Placek’s view that “the best brand names, like poems, work by compressing into a single euphonious word an array of specific, resonant meanings and associations,” but noting that Placek’s clients are typically more concerned with effectiveness than art). 2. See, e.g., Gail Saltz, My Sister-in-Law Stole My Baby Name! What to Do If Someone Wants to Use the Same Moniker for Their Child, TODAY (Mar. 21, 2007, 5:38 PM), http://today.msnbc.msn.com/id/ 17724692/ns/today-relationships/t/my-sister-in-law-stole-my-baby-name. The scenario is common enough to have been mentioned in an episode of Sex and the City and an episode of Seinfeld. See Sex and the City: The Baby Shower (HBO television broadcast Aug. 9, 1998) (depicting Charlotte complaining about a childhood friend who “stole [the] baby name” that she invented when she was eleven years old); Seinfeld: The Seven (NBC television broadcast Feb. 1, 1996) (depicting George’s outrage when his UCILR V2I2 Assembled v4 (Do Not Delete) 7/14/2012 2:14 PM 2012] A NAME I CALL MYSELF 587 The selection or invention of a name for one’s child—or one’s pet, product, or avatar—is frequently associated with such property-related rhetoric. It should not be surprising in a society where naming rights for buildings go for millions of dollars3 that one’s name is thought of as property and thus as something that might be bought, sold, or stolen.4 Marketers of consumer data have accustomed us to the notion of names as the subject of commerce, a position some online environments anticipate when they explicitly restrict the sale of usernames.5 Our continuing (and unfortunate) awareness of the crime commonly known as identity theft has also trained us to think of the indicia used to identify ourselves in society, including our names, as things that can be owned. And various literary metaphors invoke the concept of one’s name as the hook on which reputation hangs; when one’s reputation is besmirched, it is one’s name that is seen as damaged or pilfered goods.6 When parents or parents-to-be complain of someone having “stolen” the name they have chosen for their baby, this property rhetoric is not likely to have been driven by legal concerns. Indeed, the law has a particularly utilitarian view of names as property. Names have value in the law largely as a result of their denotative function—that is, their ability to identify an individual or entity. Thus, the use of a name is unlawful when that use confuses or misleads consumers (as in trademark law’s prohibition of the use of another’s trademark to cause confusion as to source), or when the name is used to obtain an unauthorized economic benefit (as in a false endorsement case, identity theft, or a violation of the right of publicity). The same is true in environments governed by contract rather than by tort, such as terms of service on social networking sites that prohibit impersonation of other users. These concerns are not likely to be relevant to the girlfriend reveals the name for his future first-born child to her cousin, leading the cousin to give it to her child: “It’s my name. I made it up. You can’t just steal it.”). 3. See, e.g., Ann Bartow, Naming Rights and the Physical Public Domain, 40 U.C. DAVIS L. REV. 919, 926–29 (2007); Joseph Blocher, School Naming Rights and the First Amendment’s Perfect Storm, 96 GEO. L.J. 1, 9 (2007). 4. Courts’ rhetoric occasionally contributes to this notion. See, e.g., Perfection Mfg. Co. v. B. Coleman Silver’s Co., 270 F. 576, 577 (7th Cir. 1921) (referring to the “business parasite” who “first steals another’s name, then his business, and finally attempts to deceive the retail trade”); Pump, Inc. v. Collins Mgmt., Inc., 746 F. Supp. 1159, 1166 (D. Mass. 1990) (“A world-famous group such as Aerosmith, enjoying a strong base of loyal teenage support, would have absolutely no reason for stealing the name of an unknown band to sell its records. Indeed, such action would be irrational.”). 5. See, e.g., Dwyer v. Am. Express Co., 652 N.E.2d 1351, 1356 (Ill. App. Ct. 1995) (affirming the dismissal of a misappropriation claim based on the rental of cardholder information for marketing purposes, noting that the value came from defendants’ aggregation of names on the list); The Twitter Rules, TWITTER HELP CENTER, http://support.twitter.com/articles/18311-the-twitter-rules
Recommended publications
  • Downloads/Documents/Tvpn-VW Primer-V1Q308.Pdf
    City Research Online City, University of London Institutional Repository Citation: Piyathasanan, B., Mathies, C., Wetzels, M., Patterson, P. and de Ruyter, K. (2015). A Hierarchical Model of Virtual Experience and Its Influences on the Perceived Value and Loyalty of Customers. International Journal of Electronic Commerce, 19(2), pp. 126-158. doi: 10.1080/10864415.2015.979484 This is the accepted version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/17773/ Link to published version: http://dx.doi.org/10.1080/10864415.2015.979484 Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] A HIERARCHICAL MODEL OF VIRTUAL EXPERIENCE AND ITS INFLUENCES ON CUSTOMER PERCEIVED VALUE AND LOYALTY Abstract Many businesses use virtual experience (VE) to enhance the overall customer experience, though extant research offers little guidance for how to improve consumers’ VE. This study, anchored in activity theory, examines key drivers of VE and its influences on value perceptions and customer loyalty.
    [Show full text]
  • A Third Age of Avatars Bruce Damer, [email protected] Damer.Com | Digitalspace.Com | Ccon.Org | Biota.Org | Digibarn.Com
    A Third Age of Avatars Bruce Damer, [email protected] damer.com | digitalspace.com | ccon.org | biota.org | digibarn.com Ò Started life on a PDP-11 fresh out of high school (1980), programmed graphics, videotext systems, dreamed of self replicating robots on the moon, designed board games, built model space stations. Ò Worked at IBM Research in 1984 (Toronto, New York), introduced to Internet, optical computing. Ò At Elixir Technologies 1987-94, wrote some of first GUI/Windows-Icons Publishing software on the IBM PC platform used 100 countries. Ò Established Contact Consortium in 1995, held first conferences on avatars (Earth to Avatars, Oct 1996) Ò Wrote “Avatars!”in 1997. Hosted and supported 9 conferences until 2003 on various aspects of virtual worlds (AVATARS Conferences, VLearn3D, Digital Biota) Ò Founded DigitalSpace in 1995, produced 3D worlds for government, corporate, university, and industry. Evangelism for Adobe (Atmosphere), NASA (Digital Spaces, open source 3D worlds for design simulation of space exploration) and NIH (learning games for Autism) Ò Established DigibarnComputer Museum (2002) Ò Virtual Worlds Timeline project (2006-2008) to capture and represent the history of the medium Ò The Virtual World, its Origins in Deep Time Ò Text Worlds Ò Graphical Worlds Ò Internet-Connected Worlds Ò The Avatars Cyberconferences Ò Massive Multiplayer Online RPGs Ò Virtual World Platforms Ò Virtual Worlds Timeline Project and Other Research History of Virtual Worlds The Virtual World, its Origins in Deep Time So what is a Virtual World? A place described by words or projected through pictures which creates a space in the imagination real enough that you can feel you are inside of it.
    [Show full text]
  • Virtual Worlds: Definition, History and the Elements That Compose Them
    1 Chapter 1 Virtual Worlds: Definition, History and the Elements that Compose Them David Oyarzun Vicomtech, Spain María del Puy Carretero Vicomtech, Spain Amalia Ortiz Enne, Spain Alex García-Alonso University of the Basque Country, Spain aBSTraCT This chapter presents an introductory overview of virtual worlds. Its purpose is to give the reader a basic knowledge about what a virtual world is. It also discusses some open issues that, from the author’s point of view, should be taken into account when new virtual worlds, or new applications running over exist- ing virtual worlds, are designed. The chapter provides a general definition of a virtual world, presents a historic review of these systems and describes the main features and elements that they are composed of. The chapter aims to be useful to the non-technical readers in that it shall provide a clearer concept of virtual worlds. In the case of technical readers, it attempts to be a reference for further research. BuT, WHaT IS a VIrTuaL WorLd? In this manner, we think of concepts related to them, such as multiuser capabilities, sense of Nowadays, most people when ask what is a Virtual presence, etc. World is can give a more or less clear answer. But, the truth is that an universally accepted This question prompts most to think about gen- definition of Virtual World does not exist. That is, eral purpose virtual worlds such as Second Life® there is no existing agreement about the concrete or There, or perhaps game-oriented worlds like features that compose a virtual world and, and World of Warcraft.
    [Show full text]
  • 7 Multi-Player Online Role-Playing Games
    7 Multi-Player Online Role-Playing Games Mark Chen; Riley Leary; Jon Peterson; David Simkins This chapter describes multiplayer online role-playing games (MORPGs) where players participate through networked connections to collectively build a narrative or experience with a game that persists independent of who is logged in. We discuss two main traditions of these games (see Chapter 8 for an emerging tradition): 1. Multi-User Dungeons (MUDs), and 2. Massively Multiplayer Online Role-Playing Games (MMORPGs). MUDs and MMORPGs generally allow for a “massive” amount of players—sometimes hundreds, thousands, or tens of thousands of players who simultaneously engage in the same game. Most MUDs and MMORPGs feature worlds where players log in at any time to visit, providing players with a persistent world independent of who is logged in. A variety of agents are at play shaping the multiplayer online RPG form. Creators have introduced novel game systems or narratives while dealing with the affordances of what everyone agrees is an RPG, but creators are also constrained by the technologies of their time rather than inherent limitations in RPGs. There also exists a parallel history in non-digital RPGs and computer role-playing games (CRPGs) that influence the online games. Thus the evolution of MORPGs is not channeled through just one tradition. Thankfully, first-hand accounts of the history of the multiplayer online RPG industry (Bartle, 2010) and first-hand accounts of design and management decisions for specific games (e.g. Morningstar & Farmer, 1991; Curtis, 1996; Mulligan & Patrovsky, 2003) exist. One thing these accounts lack is scrutiny from scholars across multiple disciplines, studying specific player phenomena in online gaming, so this chapter complements the historical timeline with notable scholarly research on player behavior and community engagement.
    [Show full text]
  • Games of Empire Electronic Mediations Katherine Hayles, Mark Poster, and Samuel Weber, Series Editors
    Games of Empire Electronic Mediations Katherine Hayles, Mark Poster, and Samuel Weber, Series Editors 29 Games of Empire: Global Capitalism and Video Games Nick Dyer- Witheford and Greig de Peuter 28 Tactical Media Rita Raley 27 Reticulations: Jean-Luc Nancy and the Networks of the Political Philip Armstrong 26 Digital Baroque: New Media Art and Cinematic Folds Timothy Murray 25 Ex- foliations: Reading Machines and the Upgrade Path Terry Harpold 24 Digitize This Book! The Politics of New Media, or Why We Need Open Access Now Gary Hall 23 Digitizing Race: Visual Cultures of the Internet Lisa Nakamura 22 Small Tech: The Culture of Digital Tools Byron Hawk, David M. Rieder, and Ollie Oviedo, Editors 21 The Exploit: A Theory of Networks Alexander R. Galloway and Eugene Thacker 20 Database Aesthetics: Art in the Age of Information Overfl ow Victoria Vesna, Editor 19 Cyberspaces of Everyday Life Mark Nunes 18 Gaming: Essays on Algorithmic Culture Alexander R. Galloway 17 Avatars of Story Marie-Laure Ryan 16 Wireless Writing in the Age of Marconi Timothy C. Campbell 15 Electronic Monuments Gregory L. Ulmer 14 Lara Croft: Cyber Heroine Astrid Deuber- Mankowsky 13 The Souls of Cyberfolk: Posthumanism as Vernacular Theory Thomas Foster 12 Déjà Vu: Aberrations of Cultural Memory Peter Krapp 11 Biomedia Eugene Thacker 10 Avatar Bodies: A Tantra for Posthumanism Ann Weinstone 9 Connected, or What It Means to Live in the Network Society Steven Shaviro 8 Cognitive Fictions Joseph Tabbi 7 Cybering Democracy: Public Space and the Internet Diana Saco 6 Writings Vilém Flusser 5 Bodies in Technology Don Ihde 4 Cyberculture Pierre Lévy 3 What’s the Matter with the Internet? Mark Poster 2 High Techne¯: Art and Technology from the Machine Aesthetic to the Posthuman R.
    [Show full text]
  • Popielinski, M.A
    Noncorporeal Embodiment and Gendered Virtual Identity Dissertation Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Lea Marie Popielinski, M.A. Graduate Program in Women’s Studies The Ohio State University 2012 Dissertation Committee: Cathy A. Rakowski, Advisor Cynthia Selfe Mary Thomas Copyright by Lea Marie Popielinski 2012 Abstract This dissertation introduces the concept of noncorporeal embodiment as an analytical tool for understanding the experience of having a body in three-dimensional graphical virtual space, i.e., a representational avatar body. I propose that users of virtual worlds such as Second Life develop a sense of embodiment that is comparable but not identical to a sense of embodiment in the actual world. The dissertation explores three key areas—the development of a virtual identity, the practice of virtual sexuality, and the experience of virtual violence—to locate evidence that Second Life residents identify with their avatars in ways that reflect the concept as it is developed in the text. Methods include interviews with Second Life residents, a blog that presents questions for public response, and the use of resident-produced written materials (e.g., blogs, forum discussions, classifed ads), while theoretical perspectives are drawn from feminist theorists concerned with studies of the body in various respects. The dissertation concludes with a summation of the social patterns observed in the previous chapters and with a discussion of future directions for further research. ii Acknowledgments The completion of this dissertation was long in coming, and it would never have arrived without the guidance, support, and participation of a number of individuals who did not give up on me and would not let me give up on myself throughout the process.
    [Show full text]
  • Virtual World Primer
    A Virtual Worlds Primer Executive Summary This report provides an overview of virtual worlds – what they are, what they are used for and who uses them. Virtual worlds are simulated environments on the internet, accessed via a computer and sometimes mobile phone. They are persistent, shared experiences for tens of millions of people around the globe. There are three basic kinds of virtual world: games, social worlds and world building tools. While the technology for all three types is similar, each has a different range of uses and different user demographics. People of all ages around the world use virtual worlds. Some are targeted at specific age ranges, such as Club Penguin which is 6+ and Second Life which is 18+. However, World of Warcraft and other virtual worlds appeal to people from their mid-teens through to retirement. From their invention in 1978 at the University of Essex, virtual worlds have grown steadily in popularity. Globally, the number of users of virtual worlds is now in the hundreds of millions, with several individual virtual worlds reporting figures over the 10 million mark. And these users are spending between two and four hours in a virtual world every day, often sacrificing television viewing time to do so. Business models for virtual worlds include: subscription fees, micro-transactions, and advertising supported worlds - including fully branded spaces such as Virtual MTV (vMTV). Within game worlds, complex economies thrive on the redistribution of virtual resources by individual users. Social worlds in particular find the users embedding traditional business models into the virtual world by offering goods and services such as marketing and design of virtual objects for real currency.
    [Show full text]
  • Virtual Worlds: Why People Play Introduction
    Virtual Worlds: Why People Play Richard Bartle –University of Essex [email protected] Ask people why they play virtual worlds, and their response is likely to be some variant of “to have fun”. This is pretty well the bottom line for players, but it’s not detailed enough to be of much use to designers. What do they find fun? Why do they find it fun? How does their idea of what is fun change over time? What can designers do to make them have more fun? And what happens when they stop having fun? Introduction The hypothesis outlined here asserts that virtual worlds are about the celebration of identity . It stems from the observation that different players find different kinds of thing “fun”, and, furthermore, that their idea of what constitutes “fun” changes along predictable lines as they play. The hypothesis also suggests that there is an age-old precedent for this. Player Types The original player types model [Bartle96] divides players into four categories, using two axes that express a player’s degree of preference for acting on or interacting with the virtual world itself or its (other) players. Figure 1 illustrates this as a graph. Acting Killers Achievers Players World Socializers Explorers Interacting Figure 1. The original player types graph. This gives four broad types of players: • Achievers like acting on the world. They are typically gamers, playing to “win”. • Explorers like interacting with the world. They delight in discovery. Writing for MMP Game Development 1 • Socializers like interacting with other players. They spend a lot of their time chatting.
    [Show full text]
  • Virtual Justice: the New Laws of Online Worlds
    VIRTUAL JUSTICE VIRTUAL JUSTICE the new laws of online worlds greg lastowka / new haven and london Portions of this work are adapted, with substantial revisions, from my prior writ- ings on virtual worlds, including “! e Laws of the Virtual Worlds” (with Dan Hunter), 92 California Law Review 1 (2004); “Virtual Crimes” (with Dan Hunter), 49 New York Law School Law Review 293 (2004); “Amateur- to- Amateur” (with Dan Hunter), 46 William & Mary Law Review 951 (2004); “Against Cyberproperty” (with Michael Carrier), 22 Berkeley Technology Law Journal 1485 (2007); “Decoding Cy- berproperty”, 40 Indiana Law Review 23 (2007); “User-Generated Content & Virtual Worlds,” 10 Vanderbilt J. Entertainment & Technology Law 893 (2008); “Planes of Power: EverQuest as Text, Game and Community,” 9 Game Studies 1 (2009); and “Rules of Play,” 4 Games & Culture 379 (2009). Copyright © 2010 by Greg Lastowka. All rights reserved. Subject to the exception immediately following, this book may not be reproduced, in whole or in part, including illustrations, in any form (beyond that copying per- mitted by Sections 107 and 108 of the U.S. Copyright Law and except by reviewers for the public press), without written permission from the publishers. ! e author has made an online version of this work available under a Creative Commons Attribution- Noncommercial 3.0 License. It can be accessed through the author’s Web site at http://www.chaihana.com/pers.html. Yale University Press books may be purchased in quantity for educational, busi- ness, or promotional use. For information, please e-mail [email protected] (U. S. o# ce) or [email protected] (U.
    [Show full text]
  • Bartle, Richard A.: Understanding the Limits of Theory
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by University of Essex Research Repository Bartle, Richard A.: Understanding the Limits of Theory . In Chris Bateman (ed.): Beyond Game Design: Nine Steps to Creating Better Videogames. Delmar: 2009. Step 4: Understanding the Limits of Theory Richard A. Bartle University of Essex, UK Abstract Bartle’s 1 player types model is the best-known and most widely-used theory of virtual world design. However, it is frequently misunderstood and misapplied. This article examines the basic theory and describes how it tends to be used in practice. Then, it explains how it should be used… Anecdote One of MUD2 ’s players was called Dextrus. Dextrus was among the most imaginative players 2 we ever had – very innovative, very exciting and very charming. She had something of a bad girl reputation, though: in a game where character death was permanent 3, people tended to be more than a little upset when Dextrus appeared out of nowhere, beat them up and took their stuff. It was made all the more embarrassing because she was invariably at a lower level than her victims when she did this. One day, Dextrus decided to abandon her killing ways. Tired of being treated as a pariah, she announced that she would thenceforth fight no other player characters except in self defence. Sure enough, that’s what she did. In the weeks that followed, she redeemed her previous indiscretions by helping out other people unstintingly; she rushed to their defence when monsters caught them unawares, she gave them her own equipment to use, and she led thrilling expeditions to the more far-flung and dangerous parts of The Land.
    [Show full text]
  • The Value of Virtual Assets: the Role of Game Characters in Mmogs
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Manninen, Tony; Kujanpää, Tomi Article The value of virtual assets: The role of game characters in MMOGs International Journal of Business Science & Applied Management (IJBSAM) Provided in Cooperation with: International Journal of Business Science & Applied Management (IJBSAM) Suggested Citation: Manninen, Tony; Kujanpää, Tomi (2007) : The value of virtual assets: The role of game characters in MMOGs, International Journal of Business Science & Applied Management (IJBSAM), ISSN 1753-0296, International Journal of Business Science & Applied Management, s.l., Vol. 2, Iss. 1, pp. 21-33 This Version is available at: http://hdl.handle.net/10419/190581 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. https://creativecommons.org/licenses/by/2.0/uk/ www.econstor.eu Int.
    [Show full text]
  • Case Studies Using Multiuser Virtual Worlds As an Innovative Platform for Collaborative Design
    www.itcon.org - Journal of Information Technology in Construction - ISSN 1874-4753 CASE STUDIES USING MULTIUSER VIRTUAL WORLDS AS AN INNOVATIVE PLATFORM FOR COLLABORATIVE DESIGN SUBMITTED: March 2010 REVISED: September 2010 PUBLISHED: February 2011 at http://www.itcon.org/2011/12 EDITOR: Turk Z. Kathryn E. Merrick, Dr, School of Engineering and Information Technology University of New South Wales Australian Defence Force Academy; [email protected] and http://seit.unsw.adfa.edu.au/staff/sites/kmerrick/ Ning Gu, Dr, School of Architecture and Built Environment University of Newcastle, Australia; [email protected] and http://www.newcastle.edu.au/research/expertise/141419.html Xiangyu Wang Dr, Senior Lecturer, Construction Management and Property Discipline, Faculty of the Built Environment, The University of New South Wales, Australia. [email protected] SUMMARY: To some extent, design can be described as a process concerned with changing the state of an environment through purposeful and constrained decision making that requires exploration, creativity and learning. The broad discipline of design incorporates the study of design methodology, technologies for design and design thinking. Design projects in the Architecture, Engineering and Construction (AEC) domains generally require efficient collaboration between designers from different specialties involved in the entire lifecycle of a project, and often based at different locations. In addition, there is emerging potential for human-computer co-creativity in the design process. This paper investigates the innovative use of emerging multiuser virtual world technologies for supporting human-human collaboration and human-computer co-creativity in design. The paper defines three conceptual technology spaces that describe the different aspects of virtual worlds that make them useful as platforms for certain types of collaborative design: design tools for modelling new artefacts, support for communication, and the ability to incorporate artificial models of cognitive design processes.
    [Show full text]